Security analysis for SmartThings IoT applications.
Florian SchmeidlBara' NazzalManar H. AlalfiPublished in: MOBILESoft@ICSE (2019)
Keyphrases
- security analysis
- smart card
- management system
- security requirements
- public key
- security model
- high security
- cloud computing
- image encryption
- security properties
- authentication protocol
- mutual authentication
- security problems
- encryption scheme
- encryption algorithm
- user authentication
- private key
- software architecture
- operating system
- wavelet transform
- data model
- data mining